Thu.Nov 16, 2023

article thumbnail

Ukraine Tracks a Record Number of Cyber Incidents During War

Data Breach Today

Hackers Steal CCTV Footage to Study Efficacy of Missile Strikes and Drone Attacks Ukraine's national computer emergency response team, CERT-UA, says it sees an increase in cyber incidents as Russia's invasion continues. While wiper attacks are ongoing, a rising Russian hacker tactic involves stealing private CCTV footage to study the efficacy of missile strikes and drone attacks.

IT 277
article thumbnail

Alleged Extortioner of Psychotherapy Patients Faces Trial

Krebs on Security

Prosecutors in Finland this week commenced their criminal trial against Julius Kivimäki , a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out how they connected the extortion spree to Kivimäki, a notorious hacker who was convicted in 2015 of perpetrating tens of thousands of cybercrimes, including data breaches, payment fraud, operating a botnet and calli

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lawsuit: Health Insurer's AI Tool 'Illegally' Denies Claims

Data Breach Today

Plaintiffs Say UnitedHealthcare Algorithm Rejects Coverage for Elderly Patients The estates of two deceased UnitedHealthcare Medicare Advantage policyholders allege in a proposed federal class action lawsuit filed this week that the insurance giant is using an AI tool to illegally deny necessary coverage for post-acute care, such as skilled nursing, to elderly plan members.

Insurance 282
article thumbnail

News alert: Bridewell sees democratized cybercrime, regulatory lag, smart malware coming in 2024

The Last Watchdog

Houston, Texas, USA – 16 Nov. 2023 – Given the sharpening complexity of cyber threats, our digital and physical infrastructure faces mounting challenges. In the past year alone, we’ve seen cybercriminals refine their arsenal with sophisticated tools aimed squarely at evading defences and causing disruption. This isn’t an underground effort but a professional marketplace, teeming with state-backed operatives, criminal collectives, and rogue activists.

article thumbnail

LLMs in Production: Tooling, Process, and Team Structure

Speaker: Dr. Greg Loughnane and Chris Alexiuk

Technology professionals developing generative AI applications are finding that there are big leaps from POCs and MVPs to production-ready applications. They're often developing using prompting, Retrieval Augmented Generation (RAG), and fine-tuning (up to and including Reinforcement Learning with Human Feedback (RLHF)), typically in that order. However, during development – and even more so once deployed to production – best practices for operating and improving generative AI applications are le

article thumbnail

How State Governments Can Regulate AI and Protect Privacy

Data Breach Today

Regulating AI is "like regulating Jell-O," said Massachusetts risk counsel Jenny Hedderman, but states are looking at regulating "areas of harm" rather than AI as a whole. In this episode of "Cybersecurity Insights," Hedderman discusses privacy, third-party vendor risk, and lawyers' use of AI.

Privacy 273

More Trending

article thumbnail

EU AI Act Will Be an 'Enabler for Trust,' Lawmaker Says

Data Breach Today

Trilogue Talks in Final Stages, Says European Parliament Member European lawmakers behind an artificial intelligence regulation that's close to finalization predicted Thursday the law will set global standards. "We want AI to develop in Europe, and this is why we want to build a trustworthy ecosystem," said Brando Benifei.

article thumbnail

A Spy Agency Leaked People's Data Online—Then the Data Was Stolen

WIRED Threat Level

The National Telecommunication Monitoring Center in Bangladesh exposed a database to the open web. The types of data leaked online are extensive.

Privacy 131
article thumbnail

Google Says 4 Attack Campaigns Exploited Zimbra Zero-Day

Data Breach Today

Zimbra Patched the Cross-Site Scripting Vulnerability on July 25 A zero-day flaw in the Zimbra Collaboration email server proved to be a bonanza for hackers as four distinct threat actors exploited the bug to steal email data and user credentials, says Google. Most of the exploit activity occurred after Zimbra had posted a hotfix on July 5.

269
269
article thumbnail

Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass

Dark Reading

There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.

117
117
article thumbnail

Your Expert Guide to CX Orchestration & Enhancing Customer Journeys

Speaker: Keith Kmett, Principal CX Advisor at Medallia

Join Keith Kmett, Principal CX Advisor, in this new webinar that will focus on: Understanding CX Orchestration Fundamentals: Gain a solid understanding of what CX orchestration is, its significance in the customer experience landscape, and how it plays a crucial role in shaping customer journeys. This includes the key concepts, strategies, and best practices involved in CX orchestration. 🔑 Connection to Customer Journey Maps: How to effectively integrate customer journey mapping into the

article thumbnail

SonicWall Buys Solutions Granted to Offer MSPs More Services

Data Breach Today

Buying Master MSSP Will Bring MDR, SOC and Vulnerability Management to MSPs, MSSPs SonicWall acquired a longtime master MSSP partner to bring MDR, SOC and vulnerability management capabilities to its managed service providers. Buying Solutions Granted will help SonicWall detect and respond to endpoint or cloud-based threat activity on behalf of its MSP and MSSP partners.

Cloud 269
article thumbnail

3 Ways Behavioral Economics Obstructs Cybersecurity

Dark Reading

People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.

article thumbnail

BlackCat Gang Tattles to SEC About Victim Not Disclosing Breach

Data Breach Today

Ransomware Group Says MeridianLink Didn't Tell SEC About Cyberattack Within 4 Days The BlackCat ransomware group tattled to U.S. federal regulators about an alleged victim not disclosing a material cyberattack within four business days. The group, also known as Alphv, listed MeridianLink on its data leak site and threatened to leak stolen data.

article thumbnail

Samsung suffered a new data breach

Security Affairs

Samsung Electronics disclosed a data breach that exposed customer personal information to an unauthorized individual. Samsung Electronics suffered a data breach that exposed the personal information of some of its customers to an unauthorized individual. The security breach was discovered on November 13, 2023, and impacted customers who made purchases from the Samsung UK online store between July 1, 2019, and June 30, 2020.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CISA, FBI Issue New Warning Following Las Vegas Cyberattack

Data Breach Today

Agencies Release Joint Advisory Urging Organizations to Implement New Mitigations CISA and the FBI released an advisory recommending that critical infrastructure organizations implement a series of recommendations to thwart a unique hacking group known for targeting commercial facilities, as seen in the recent cyberattack targeting MGM Resorts International.

249
249
article thumbnail

Despite Hype, the Password-Free Workplace Is Still a Long Way Off

Dark Reading

More than half of organizations are nowhere near ditching passwords, even as cyberattackers continue to have a field day with workers' poor credential choices.

Passwords 119
article thumbnail

SEC Aims to Avoid Cyber Disclosure Rule 'Compliance Burdens'

Data Breach Today

Official Says Disclosure Rule Includes Exceptions, Extensions for Smaller Companies The U.S. Securities and Exchange Commission's requirement for publicly traded companies to report cyber incidents that have a material impact within four days is "not about playing gotcha with public companies," said the commission’s director of the corporation finance division.

article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google Threat Analysis Group (TAG) researchers revealed that a zero-day vulnerability, tracked as CVE-2023-37580 (CVSS score: 6.1), in the Zimbra Collaboration email software was exploited by four different threat actors to steal email data, user credentials, and authentication tokens from government organizations.

article thumbnail

Use Cases for Apache Cassandra®

There’s a good reason why Apache Cassandra® is quickly becoming the NoSQL database of choice for organizations of all stripes. In this white paper, discover the key use cases that make Cassandra® such a compelling open source software – and learn the important pitfalls to avoid. From understanding its distributed architecture to unlocking its incredible power for industries like healthcare, finance, retail and more, experience how Cassandra® can transform your entire data operations.

article thumbnail

Hanzo Wins “Best Use of AI for eDiscovery” In 2023 LegalTech Breakthrough Awards Program

Hanzo Learning Center

Hanzo wins 'Best Use of AI for eDiscovery' at 2023 LegalTech Breakthrough Awards, for its innovative AI-driven tool, Hanzo Illuminate with Spotlight AI.

IT 119
article thumbnail

Leaving Authentication Credentials in Public Code

Schneier on Security

Seth Godin wrote an article about a surprisingly common vulnerability: programmers leaving authentication credentials and other secrets in publicly accessible software code: Researchers from security firm GitGuardian this week reported finding almost 4,000 unique secrets stashed inside a total of 450,000 projects submitted to PyPI, the official code repository for the Python programming language.

article thumbnail

Vietnam Post exposes 1.2TB of data, including email addresses

Security Affairs

Vietnam Post Corporation, a Vietnamese government-owned postal service, exposed security logs and employee email addresses to external cyber threats Vietnam Post Corporation, a Vietnamese government-owned postal service, left its security logs and employee email addresses accessible to outside cyber snoopers, Cybernews researchers have discovered. The exposed sensitive data could spell trouble if accessed by malicious actors.

Security 106
article thumbnail

APTs Swarm Zimbra Zero-Day to Steal Government Info Worldwide

Dark Reading

At least four separate campaigns against CVE-2023-37580 in the popular Zimbra Collaboration Suite aimed to siphon up reams of sensitive mail data.

article thumbnail

Reimagining CX: How to Implement Effective AI-Driven Transformations

Speaker: Steve Pappas

As businesses strive for success in an increasingly digitized world, delivering an exceptional customer experience has become paramount. To meet this demand, enterprises are embracing innovative approaches that captivate customers and fuel their loyalty. 💥 Enter conversational AI - an absolute game-changer (if done right) in redefining CX norms.

article thumbnail

FTC’s Voice Cloning Challenge

Schneier on Security

The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.

article thumbnail

'Randstorm' Bug: Millions of Crypto Wallets Open to Theft

Dark Reading

The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.

Passwords 104
article thumbnail

US Congress Report Calls for Privacy Reforms After FBI Surveillance 'Abuses'

WIRED Threat Level

A new report by an oversight committee in the US House of Representatives says the FBI has routinely violated rules governing FISA's Section 702 surveillance program and must be reined in.

Privacy 86
article thumbnail

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Dark Reading

Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.

article thumbnail

Lessons Learned in PostgreSQL®

In today's digital landscape, the threat of ransomware demands proactive defense. This paper, inspired by a real PostgreSQL® database incident, offers vital strategies for effective mitigation. Instaclustr expert Perry Clark outlines immediate actions to minimize risks, ensuring a swift response to ransomware threats and protecting critical data assets.

article thumbnail

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

KnowBe4

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.

article thumbnail

Consumer Software Security Assessment: Should We Follow NHTSA's Lead?

Dark Reading

Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.

article thumbnail

Creating a sustainable future with the experts of today and tomorrow

IBM Big Data Hub

When extreme weather strikes, it hits vulnerable populations the hardest. In the current global climate of stronger and more frequent storms, heat waves, droughts and floods, how do we build more positive environmental and social impact? We have a responsibility to apply our technological expertise, resources and ecosystem to help the world become more resilient to these environmental challenges.